Malicious
Malicious

997352f25957b1c049ba69156c1e3cdc

PE Executable
|
MD5: 997352f25957b1c049ba69156c1e3cdc
|
Size: 65.54 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
997352f25957b1c049ba69156c1e3cdc
Sha1
30a8e072e7f687a1f6eacee82cb16f5cac879a9a
Sha256
20ecb87866b8002d5bdc52a3db1f13d3d12825eebe86864ede4fdef9140e8d98
Sha384
e8d2d581011b7795229291d8e93034a054195796f5f5684bb3efbfb7fddac361cab5fb25d4a6a31c2706198b4174bf20
Sha512
3b396c03b3ea34413a6c841f249c9b2ab0763e4fcd55408c881c4a353ee81ab46bbe9340167763c4408b8dd000190b47c35840b638cbc2e9a3028cca2267576a
SSDeep
1536:AXb9cBDZ+uJDiLnyVfbbnwS8GmEIVclN:AXuDZlJ4n2fbbn/SY
TLSH
6C535A003788C966E2EE4AF4BDF2560006B5D5732102DB5E7CC414DBAB9EFC64A166FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

Q1kzT3FHRURKT2tISHBvaFA5Y0Zoc3lWakVCZjZOQVE=

Pastebin

-

Certificate

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

ServerSignature

YMhHkJ3FTphKZ5zobHvSIlap9Qjspgv7R+BNZuQpxDZ/yt92ze7OBKtvtPvHECUEsMu/NBNCmreJrEuWnjiO1gMCxsp0A+x6WUm+HMK7U8Mzv/lc0e6zGP/GWVxbWDv40I+u0Vb0eF2iUATPzWYmiRxcrqljn3kc/8MVOm3V/Vg=

Install

true

BDOS

false

Anti-VM

false

Install File

sextop1.page.exe

Install-Folder

%AppData%

Ports

443,1337,1604,4782,8080,8848

Mutex

SCD_SolaraEndpoint_SentinelLock_9q0r1s2t

Version

1.0.7

Delay

1

Group

Strategy

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

sextop1.page.exe

Full Name

sextop1.page.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

sextop1.page.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

sextop1.page

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

sextop1.page.exe

Full Name

sextop1.page.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

sextop1.page.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

sextop1.page

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

Q1kzT3FHRURKT2tISHBvaFA5Y0Zoc3lWakVCZjZOQVE=

Ports

443

Ports

1337

Ports

1604

Ports

4782

Ports

8080

Ports

8848

Mutex

SCD_SolaraEndpoint_SentinelLock_9q0r1s2t

997352f25957b1c049ba69156c1e3cdc (65.54 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

Q1kzT3FHRURKT2tISHBvaFA5Y0Zoc3lWakVCZjZOQVE=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAI4aqMg0mXDOnNN7b+CVCpm/oF99MA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQyNjA5NDQxMFoXDTM2MDIwMzA5NDQxMFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAIQIsQ6iJ5BJjl9U0Me5lfMn4hwGY4WsZVRHGAnEGhbLgGXc8HRTGWd0yoy2HO4oInZ/iEIs2gew60f8XnK1HWorWHnSt0T2IRm1tJEJO3CoFFakPpGe5GSs71fhpyZevDkDiQXHRM6mr56PAeiDuChSYuRntISdFvm7iHrGLvVrAgMBAAGjMjAwMB0GA1UdDgQWBBST8O/98qCgYfVYbX3UdXhKuvkZHTAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAHyEZmk+lg+kHjGnavD6qJAGuwZQ+AOGCwOJsn9OyBSCF2N2/VkrTjJmyXPFgl+VtnscbZ9Vr6wY3odzd8YJrKyLcN3KEQJe/gNJeohoAGgdriuvnXnUYFG3HnA5csuWyuj9S5Q/RP5Vq2z8sK7GYFbroZigGMJNo7tu13EEmo/q

ServerSignature

YMhHkJ3FTphKZ5zobHvSIlap9Qjspgv7R+BNZuQpxDZ/yt92ze7OBKtvtPvHECUEsMu/NBNCmreJrEuWnjiO1gMCxsp0A+x6WUm+HMK7U8Mzv/lc0e6zGP/GWVxbWDv40I+u0Vb0eF2iUATPzWYmiRxcrqljn3kc/8MVOm3V/Vg=

Install

true

BDOS

false

Anti-VM

false

Install File

sextop1.page.exe

Install-Folder

%AppData%

Ports

443,1337,1604,4782,8080,8848

Mutex

SCD_SolaraEndpoint_SentinelLock_9q0r1s2t

Version

1.0.7

Delay

1

Group

Strategy

Artefacts
Name
Value Location
Key (AES_256)

Q1kzT3FHRURKT2tISHBvaFA5Y0Zoc3lWakVCZjZOQVE=

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

443

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

1337

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

1604

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

4782

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

8080

Malicious

997352f25957b1c049ba69156c1e3cdc

Ports

8848

Malicious

997352f25957b1c049ba69156c1e3cdc

Mutex

SCD_SolaraEndpoint_SentinelLock_9q0r1s2t

Malicious

997352f25957b1c049ba69156c1e3cdc

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙